Network Security Strategy with VLANs and Access Control Lists: Case Studies and Implementation

Authors

  • Dhafa Nugraha Djuanda Universitas Bina Sarana Informatika

DOI:

https://doi.org/10.58777/its.v2i1.305

Keywords:

Access Control List (ACL), Network Security Implementation, Network Security, Virtual Local Area Network (VLAN)

Abstract

This research focuses on the design and implementation of network security strategies using Virtual Local Area Network (VLAN) and Access Control List (ACL) at PT Pegadaian Kalibata Branch. The background of this research is the increasingly urgent need for a network security system that is able to protect infrastructure from various complex cyber threats, especially for financial business entities. In an effort to improve network security, Virtual Local Area Networks (VLANs) are used to separate network traffic based on business needs, while Access Control Lists (ACLs) are implemented to set security rules in controlling network traffic. This study uses observation, interview, and literature study methods to collect relevant data. The results show that the implementation of Virtual Local Area Network (VLAN) and Access Control List (ACL) can effectively improve network security, reduce the risk of cyberattacks, and improve bandwidth efficiency. However, some challenges such as missing configurations and bandwidth limitations still have to be overcome to achieve optimal results. This research is expected to contribute to the development of a better network security system for PT Pegadaian and other financial organizations.

References

Agustio, D. P., & Nainggolan, E. R. (2023). Penerapan Virtual Local Area Network Pada Jaringan MAN dengan Metode Filtering Berbasis Access Control List di Dinas Komunikasi dan Informatika Kota Serang. Jurnal Komputer Antartika, 1(1), 32–38.

Ayaz, M., Ammad-Uddin, M., Sharif, Z., Mansour, A., & Aggoune, E.-H. M. (2019). Internet-of-Things (IoT)-based smart agriculture: Toward making the fields talk. IEEE Access, 7, 129551–129583.

Bayu, T. I., & Nurhanif, N. (2018). Model Keamanan pada Virtual Local Area Network (VLAN) untuk Mengatasi DHCP Rogue. Indonesian Journal of Computing and Modeling, 1(2), 55–60. https://doi.org/10.24246/j.icm.2018.v1.i2.p55-60

Cahya, A., Sanjaya, H., Muttaqin, I., Permana, S., & Septian, W. R. D. (2024). PERANCANGAN DAN IMPLEMENTASI JARINGAN VIRTUAL LOCAL AREA NETWORK (VLAN) DENGAN ROUTER MIKROTIK PADA SEKOLAH. Jurnal Sistem Dan Teknologi Informasi (JSTI), 6(3).

de Fretes, A. V. C., Aritonang, M. A. S., Thamrin, M., Masril, M. A., Jufri, J., Andaria, A. C., Ernawati, T., Naufal, A. R., Sugianto, C. A., & Ekawati, N. (2024). Pengantar Ilmu Komputer. Yayasan Tri Edukasi Ilmiah.

Dhar, M. S., Marwal, R., Vs, R., Ponnusamy, K., Jolly, B., Bhoyar, R. C., Sardana, V., Naushin, S., Rophina, M., & Mellan, T. A. (2021). Genomic characterization and epidemiology of an emerging SARS-CoV-2 variant in Delhi, India. Science, 374(6570), 995–999.

Fitriansyah, A., Andreansyah, A., & Sopian, A. (2019). Penerapan Static VLAN Dan Access List Untuk Meningkatkan Keamanan Jaringan. Jurnal Teknologi Informatika Dan Komputer, 5(2), 58–63. https://doi.org/10.37012/jtik.v5i2.176

Hanipah, R., & Dhika, H. (2020). Analisa Pencegahan Aktivitas Ilegal Didalam Jaringan Dengan Wireshark. DoubleClick: Journal of Computer and Information Technology, 4(1), 11–23.

Hartono, S., Yunan, K., & Wardijono, B. A. (2023). Implementasi Vlan Cisco Untuk Pengaturan Hak Akses Pada Jaringan Komputer Sekolah. Prosiding Seminar SeNTIK, 7(1), 273–284.

Krisdianto, M. R. (2022). Rancangan Keamanan Jaringan Komputer Pada SMP Muhammadiyah 7 Palembang. Institut Teknologi dan Bisnis Palcomtech.

Mulyanto, Y., & Prakoso, S. B. (2020). Rancang Bangun Jaringan Komputer Menggunakan Sistem Manajemen Omada Controller Pada Inspektorat Kabupaten Sumbawadengan Metode Network Development Life Cycle (NDLC): Rancang Bangun Jaringan Komputer Menggunakan Sistem Manajemen Omada Controller Pada Inspektorat Kabupaten Sumbawadengan Metode Network Development Life Cycle (NDLC). Jurnal Informatika Teknologi Dan Sains (Jinteks), 2(4), 223–233.

Noviriandini, A., Bachtiar, D., & Indriyani, L. (2023). Perancangan Jaringan Virtual Local Area Network Menggunakan Cisco Packet Tracer Pada SMK Islam Assa’adatul Abadiyah. JUKI: Jurnal Komputer Dan Informatika, 5(2), 255–260.

Sanjaya, T., & Setiyadi, D. (2019). Network Development Life Cycle (NDLC) Dalam Perancangan Jaringan Komputer Pada Rumah Shalom Mahanaim. Jurnal Mahasiswa Bina Insani, 4(1), 1–10.

Santoso, J. T. (2023). Teknologi Keamanan Siber (Cyber Security). Penerbit Yayasan Prima Agus Teknik, 1–173.

Soetrisno, B. A. J., Gunawan, K. E., Subijanto, T. M. E., Oktavia, S., Widagda, T. A. K., Estevania, T. A., Santoso, B. F., Putri, J. A., Tjoa, M. O., & Irawan, A. V. (2024). Berubah Bersama Akuntansi Digital. SIEGA Publisher.

Suryawijaya, T. W. E. (2023). Memperkuat Keamanan Data melalui Teknologi Blockchain: Mengeksplorasi Implementasi Sukses dalam Transformasi Digital di Indonesia. Jurnal Studi Kebijakan Publik, 2(1), 55–68.

Tahir, M., Hariyanto, H., Firdausi, M. I., Saim, S., Nuriyah, N., & Maimunah, M. (2024). Peningkatan Keamanan Jaringan LAN dan WLAN Melalui Standard Acces Control List. Digital Transformation Technology, 4(1), 607–614. https://doi.org/10.47709/digitech.v4i1.4261

Wijaya, C. C., & Budiman, A. S. (2023). Perancangan Keamanan Jaringan Komputer Pada Router Dengan Metode ACL Pada PT. Aruna Sinar Jaya Jakarta. JOURNAL ZETROEM, 5(2), 180–186.

Downloads

Published

2024-11-30
image host Views: 177 | image host Downloaded: 105